The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the amount of new information generated in the world rapidly increases, efficient search in collections of structured data, texts and multimedia objects. 3D objects are an important type of multimedia data with many applications such as medical, chemical, CAD, etc. In this paper a great method for 3D object retrieval using silhouette feature vector on shady image. The method is based on our previously...
One of the most successful algorithms that bring realism in the world of 3-D generation is fast phong shading. The digital image data is rapidly expanding in quantity and heterogeneity. The traditional information retrieval techniques does not meet the user's demand, so there is need to develop an efficient system for content based image retrieval. Content based image retrieval means retrieval of...
The paper addresses the face recognition problem by modifying the Fuzzy Fisherface classification method. In conventional methods, the relationship of each face to a class is assumed to be crisp. The Fuzzy Fisherface method introduces a gradual level of assignment of each face pattern to a class, using a membership grading based upon the K-Nearest Neighbor (KNN) algorithm. This method was further...
In this paper, we present a hash-based technique for video authentication. Designing a good hashing technique for multimedia requires many issues to be considered such as robustness, security and tamper detection with precise localization. The work that we shall describe in this paper is a step ahead in this direction that attempts to simultaneously address these issues. The hash of the video is generated...
An image hash function provides a condensed representation of an image that can be used for authentication purposes. Security, robustness and fragility are three important issues in designing a hashing scheme for image authentication. In this paper, we propose a secure image hashing scheme that allows acceptable manipulations like JPEG compression and low pass filtering and is sensitive enough in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.